This lesson distinguishes between shared-key encryption and public-key infrastructure. Students engage in a physical 'lockbox' simulation to understand the key exchange problem that necessitates asymmetric encryption.

Similar Lessons